Identity and access management business performance through connected intelligence

This book provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. It provides reusable templates and source code examples in Java, XML, and SPML

Saved in:
Bibliographic Details
Main Author: Osmanoglu, Ertem (Author)
Format: Book
Language:English
Published: Waltham, MA Syngress 2013
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 100813
003 MY-KLNDU
005 20241220025600.0
008 221104 20132014maua bi 000 0 eng d
020 |a 9780124081406 (pbk.) 
039 9 |a 202211041126  |b VLOAD  |c 201411191539  |d faezah  |c 201411191538  |d faezah  |c 201411191252  |d faezah  |y 201410132039  |z syarifuddin 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9 .A25  |b O78 2013 
100 1 |a Osmanoglu, Ertem  |e author 
245 1 0 |a Identity and access management  |b business performance through connected intelligence  |c Ertem Osmanoglu 
264 1 |a Waltham, MA  |b Syngress  |c 2013 
264 4 |c © 2014 
300 |a xxix, 618 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a 1. Business requirements and business case development -- 2. IAM framework, key principles and definitions -- 3. Current state and capability maturity -- 4. Common challenges and key considerations -- 5. Case study : access reviews -- 6. Future state definition -- 7. IAM roadmap and strategy -- 8. Identity and access intelligence : a risk-based approach -- 9. Enabling business through cloud-based IAM -- 10. Case study : future state -- finding a way out of the labyrinth -- 11. Implementation methodology and approach -- 12. Access request, approval, and provisioning -- 13. nforcement -- 14. Access review and certification -- 15. Privileged access management -- 16. Roles and rules -- 17. IAM product selection -- 18. Case study : implementation -- 19. The future of identity and access management 
520 |a This book provides a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. It provides reusable templates and source code examples in Java, XML, and SPML 
592 |a 00013726  |b 04/11/2014  |c RM 239.80  |h PVK 
650 0 |a Computer security 
650 0 |a Computers  |x access control 
650 0 |a Computer networks  |x Security measures 
650 0 |a False personation  |x Prevention 
999 |a vtls000052957  |c 100813  |d 100813